Abstract: A method is proposed for the analysis of experimental data so as to verify the mathematical model of a heat store with a melting working medium. Topics considered include the verification of the experimental...
详细信息
Motivated by applications in social influence and viral marketing, this work introduces the Influence Maximization with Cost Fairness on Groups (IMFC) problem in social networks. Given a social network, a total budget...
详细信息
The task of finding the shortest vectors of a lattice that form a basis thereof is known as Minkowski reduction. In this work, Minkowski reduction is adapted to discrete subgroups of quaternionic spaces defined over t...
详细信息
ISBN:
(数字)9798331522896
ISBN:
(纸本)9798331522902
The task of finding the shortest vectors of a lattice that form a basis thereof is known as Minkowski reduction. In this work, Minkowski reduction is adapted to discrete subgroups of quaternionic spaces defined over the set of Hurwitz integers which constitutes a Euclidean subring of the (Hamilton) quaternions. Based on a quaternionic variant of Minkowski's greatest-common-divisor condition for suitable lattice vectors, a lattice-basis-reduction algorithm is derived. To that end, a basisupdate approach is presented which takes the non-commutativity of quaternionic multiplication into account. The reduction algorithm is finally applied in multi-user multiple-input/multipleoutput (MIMO) systems with dual-polarized antennas, where the quaternionic interference is handled by lattice-reduction-aided equalization. It is shown that quaternionic Minkowski reduction achieves significantly better results than state-of-the-art Lenstra-Lenstra-Lovász (LLL) reduction and that the successive minima of quaternionic lattices are approximated quite well.
Continual learning (CL) is a new online learning technique over sequentially generated streaming data from different tasks, aiming to maintain a small forgetting loss on previously-learned tasks. Existing work focuses...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Continual learning (CL) is a new online learning technique over sequentially generated streaming data from different tasks, aiming to maintain a small forgetting loss on previously-learned tasks. Existing work focuses on reducing the forgetting loss under a given task sequence. However, if similar tasks continuously appear to the end time, the forgetting loss is still huge on prior distinct tasks. In practical IoT networks, an autonomous vehicle to sample data and learn different tasks can route and alter the order of task pattern at increased travelling cost. To our best knowledge, we are the first to study how to opportunistically route the testing object and alter the task sequence in CL. We formulate a new optimization problem and prove it NP-hard. We propose a polynomial-time algorithm to achieve approximation ratios of $\frac{3}{2}$ for underparameterized case and $\frac{3}{2} + {r^{1 - T}}$ for overparameterized case, respectively. Simulation results verify our algorithm’s close-to-optimum performance.
Platform data mining is an important branch of data analysis. Traditional methods such as clustering have achieved satisfactory performance. To overcome the shortcomings of traditional algorithms in mathematical optim...
详细信息
ISBN:
(数字)9798331523923
ISBN:
(纸本)9798331523930
Platform data mining is an important branch of data analysis. Traditional methods such as clustering have achieved satisfactory performance. To overcome the shortcomings of traditional algorithms in mathematical optimization, this study proposes a novel model based on the sequential quadratic programming algorithm. At the algorithm level, this study first analyses the characteristics of cloud platform data and its requirements for mining efficiency. At the same time, to solve these problems, this study proposed a new data analysis framework that combines sparse factor analysis and embedded database subspace detection. The designed model optimizes attribute dimension selection and dense region extraction to the greatest extent through distribution analysis and feature correlation evaluation. At the same time, the Bayesian network node expansion algorithm is used to model the association of discrete data, and then a cascade data generation method is designed based on this model. Finally, the Bayesian network parameters are optimized by the sequential quadratic programming algorithm, and the approximate value of the Hessian matrix is efficiently solved by the BFGS algorithm, thereby improving the accuracy of the data mining algorithm. The experimental part uses the cloud platform data-set as the target data-set and verifies the stability of the proposed algorithm.
Let G = (V, E) be a directed graph on n vertices where each vertex has out-degree k. We say that G is kNN-realizable in d-dimensional Euclidean space if there exists a point set P = {p1, p2, . . ., pn} in Rd along wit...
详细信息
The potential harms of algorithmic decisions have ignited algorithmic fairness as a central topic in computer science. One of the fundamental problems in computer science is Set Cover, which has numerous applications ...
详细信息
ISBN:
(纸本)9798400712456
The potential harms of algorithmic decisions have ignited algorithmic fairness as a central topic in computer science. One of the fundamental problems in computer science is Set Cover, which has numerous applications with societal impacts, such as assembling a small team of individuals that collectively satisfy a range of expertise requirements. However, despite its broad application spectrum and significant potential impact, set cover has yet to be studied through the lens of ***, in this paper, we introduce Fair Set Cover, which aims not only to cover with a minimum-size set but also to satisfy demographic parity in its selection of sets. To this end, we develop multiple versions of fair set cover, study their hardness, and devise efficient approximation algorithms for each variant. Notably, under certain assumptions, our algorithms always guarantee zero-unfairness, with only a small increase in the approximation ratio compared to regular set cover. Furthermore, our experiments on various data sets and across different settings confirm the negligible price of fairness, as (a) the output size increases only slightly (if any) and (b) the time to compute the output does not significantly increase.
In multi-agent systems, the hybrid active-silent relative localization framework is widely employed, where only active nodes transmit signals. The selection of active nodes, known as node activation, significantly imp...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
In multi-agent systems, the hybrid active-silent relative localization framework is widely employed, where only active nodes transmit signals. The selection of active nodes, known as node activation, significantly impacts the positioning accuracy. This paper investigates the node activation in anchor-free localization systems. First, the constrained Cramér-Rao lower bound (CRLB) is derived to evaluate the localization error. Then the combinatorial optimization problem on node activation is presented and approximately solved using the difference of convex programming (DCP) method. Moreover, to reduce computational complexity, we propose a geometry-based greedy iterative (GBGI) algorithm which leverages a geometry metric to evaluate and iteratively refine the selection of active nodes. Finally, simulation results demonstrate the performance of proposed algorithms. Especially the GBGI algorithm closely approaches the optimal solution.
The powerful capabilities of large language models (LLMs) enable them to function as personal digital assistants. To ensure user privacy, personalized fine-tuning can be conducted locally on memoryconstrained AI PCs u...
详细信息
ISBN:
(数字)9798331517458
ISBN:
(纸本)9798331517465
The powerful capabilities of large language models (LLMs) enable them to function as personal digital assistants. To ensure user privacy, personalized fine-tuning can be conducted locally on memoryconstrained AI PCs using Parameter-Efficient Fine-Tuning (PEFT) algorithms, such as QLoRA[1] and QA-LORA[2]. Figure 1 illustrates the computation flow of QLoRA: BF16 input activations undergo matrix multiplication with 4-bit quantized pre-trained weights and BF16 adapter weights. In this flow, asymmetric quantization MACs represent the primary bottleneck, consuming approximately 97% of the computational load. However, current neural processing units (NPUs) offer limited support for asymmetric computation: fine-tuning Llama2-13B on an RTX 3090 takes over 25 hours. This highlights the need for fine-tuning processors optimized for asymmetric quantization. Yet, asymmetric quantization presents hardware design challenges: 1) Existing NPUs primarily support symmetric formats, introducing conversion overhead and inefficiencies; 2) Current NPUs lack efficient support for low-precision data transposition; and 3) 4-bit quantized QLoRA encounters high external access and storage demands, while the use of 2:4 sparsity in low-bit LLM finetuning[3] incurs substantial bitmask overhead with limited benefits.
Task-oriented semantic communication effectively facilitates the completion of specific tasks by conveying users' interests. Nevertheless, when a base station conveys task-oriented semantic information to multiple...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
Task-oriented semantic communication effectively facilitates the completion of specific tasks by conveying users' interests. Nevertheless, when a base station conveys task-oriented semantic information to multiple users, these users exhibit both shared and distinct interests, which leads to increased redundancy and communication costs. To reduce transmission redundancy and cost, in this paper, a flexible and efficient multicast and unicast transmission scheme based on task-oriented semantic information is investigated for users with overlapping interests. Specifically, a joint energy-delay cost function is adopted to measure the communication cost caused by transmission redundancy, which facilitates a trade-off between energy consumption and transmission delay. Then, to minimize the network cost, this paper leverages the inherent benefits of common and private streams in rate splitting multiple access (RSMA) and design a semantic information allocation strategy. The RSMA common stream is further divided into the super-common and user-common streams. A semantic information allocation mechanism is established according to the common and private streams to flexibly allocate multiple semantic information. Then, semantic information selection on super-common stream, the proportional strategy of user-common stream, and rate splitting are jointly designed to minimize the network cost. The problem is a mixed-integer problem. Block coordinate descent and successive convex approximation technique are adopted to address it. An algorithm, namely SURA, is proposed for semantic information allocation in RSMA networks. Simulation results demonstrate the proposed SURA algorithm can adaptively allocate semantic information and reduce the network cost.
暂无评论